Please wait a minute...

Current Issue

    20 September 2022, Volume 38 Issue 9
    Review
    A survey on DNS attack detection and security protection
    Jianwu ZHANG, Yanjun AN, Huangyan DENG
    2022, 38(9):  1-17.  doi:10.11959/j.issn.1000-0801.2022248
    Asbtract ( 303 )   HTML ( 78)   PDF (928KB) ( 483 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the gradual evolution of the traditional Internet to “Internet+”, the domain name system (DNS) had been continuously expanding from basic address resolution to new models such as comprehensive perception and reliable transmission.Due to the diverse functions and the extensive coverage of DNS in the new scenario, it will cause serious consequences once attacked.Therefore, the research on DNS attack detection and security protection continues and attracts more and more attention.Firstly, several common DNS attacks were introduced, including DNS spoofing, DNS covert channel, DNS distributed denial of service (DDoS) attack, DNS reflection amplification attacks, and malicious DGA domain names.Subsequently, these DNS attack detection technologies were systematically analyzed and summarized from the machine learning perspective.Then, the DNS security protection technologies were sorted out in decentralization, authenticated encryption and limited resolution.Finally, some future research directions were proposed.

    A survey on 5G capabilities enabling the factories of the future
    Yusun FU, Jinhui TANG
    2022, 38(9):  18-35.  doi:10.11959/j.issn.1000-0801.2022069
    Asbtract ( 211 )   HTML ( 42)   PDF (860KB) ( 411 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    5G systems extend mobile communication services beyond mobile telephony, mobile broadband, and massive machine-type communication into new application domains, so-called vertical domains, with special requirements for communication services.A comprehensive analysis and summary of 5G capabilities enabling the factories of the future were provided, including resilient network architecture, flexible spectrum, ultra reliable and low latency communication, time sensitive network, security and positioning.While resilient network architecture includes network slicing, non-public network, 5G LAN, and edge computing.It hopes to have a thorough and comprehensive understanding of the theoretical research and application of 5G, and a clear understanding of its challenges, so as to play a key reference for researchers and engineers in the related fields.

    Topic: Integration of Communication, Sensing, and Computing in 6G
    Integrated sensing and communication in reconfigurable intelligent surface systems: status, design and outlook
    Xiaoling HU, Zhouyuan YU, Xiaowei QIAN, Mugen PENG
    2022, 38(9):  36-49.  doi:10.11959/j.issn.1000-0801.2022259
    Asbtract ( 804 )   HTML ( 83)   PDF (2205KB) ( 853 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Integrated sensing and communication (ISAC) is the dominant trend of the sixth generation mobile communication networks (6G).The introduction of ISAC into the reconfigurable intelligent surface (RIS) system can expand the system coverage, improve both communication and sensing performances, and reduce the hardware cost as well as the power consumption of the system.On the basis of outlining and analyzing the research status of ISAC in RIS systems, two non-orthogonal ISAC methods were proposed to support concurrent communication and sensing for blind-zone users on non-orthogonal time-frequency resources.Finally, the technical challenges and future development of ISAC in RIS systems were discussed.

    Power allocation satisfying user fairness for integrated sensing and communication system based on orthogonal time frequency space modulation
    Ke XU, Luping XIANG, Jie HU, Kun YANG
    2022, 38(9):  50-59.  doi:10.11959/j.issn.1000-0801.2022256
    Asbtract ( 237 )   HTML ( 32)   PDF (1044KB) ( 422 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    By sharing resources for radar sensing and communications, integrated sensing and communication (ISAC) has promising applications in diverse scenarios, such as human-machine interface, vehicle-to-everything (V2X), remote sensing, and environment surveillance.In order to resolve the frequency resource conflict in high-speed V2X networks, based on the modulation orthogonal time frequency (OTFS), the OTFS-ISAC system was proposed, where the base station receives reflected echoes to obtain sensing parameters of vehicle motion and then establish the vehicle’s mobile topology.Additionally, in terms of the multi-vehicle network, the design of OTFS-ISAC with NOMAsatisfying the fairness and the algorithm of power allocation were proposed.Simulations show that compared with the NOMA without radar sensing system, the proposed design improves the system data rate by 25%.

    Downlink wireless resource allocation method of V2X based on wireless sensing assistance
    Zhimin HE, Yuzhe LIN, Yujie CHENG, Shi YAN
    2022, 38(9):  60-70.  doi:10.11959/j.issn.1000-0801.2022253
    Asbtract ( 181 )   HTML ( 27)   PDF (931KB) ( 258 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In vehicle-to-everything, the high-speed distribution and sharing of perception and safety data is crucial to road safety.However, the instability of communication links caused by high-speed vehicle movement will make the existing communication resource allocation methods based on vehicle location information reporting no longer efficient.Therefore, a downlink wireless resource allocation method based on wireless sensing assistance of communication nodes was proposed.Firstly, a joint optimization problem of communication mode selection and wireless resource allocation under the orthogonality of communication and sensing resources was constructed.Then, a communication mode selection based on clustering by Delaunay triangulation and a resource allocation strategy based on improved graph coloring to improve the downlink throughput was proposed to solve the problem of construction.Finally, the impact of wireless sensing estimation error and the number of vehicles on the performance of the algorithm was simulated and analyzed.Simulation results show that compared with traditional methods, the proposed algorithm can obtain better downlink communication performance gain under the same proportion of sensing bandwidth resources, and can withstand the impact of larger sensing errors on performance.At the same time, the computational complexity of the proposed algorithm is lower and the network computing resources can be saved.

    Study on integrated sensing and communication for 6G RAN
    Shiqiang SUO, Shenghao XU, Ting ZENG, Qiusha GONG, Ke WANG
    2022, 38(9):  71-76.  doi:10.11959/j.issn.1000-0801.2022260
    Asbtract ( 199 )   HTML ( 18)   PDF (796KB) ( 449 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The integrated sensing and communication technology has become one of the important research directions for 6G system.The necessity of integrated sensing and communication at the air inter face was analyzed and summarized, as not only for improving the service capacity for 6G system but also for effectively improving the spectrum utilization.One integrated sensing and communication scheme at the air interface level for 6G RAN was proposed, including the high level framework of RAN system, the multiplexing mode of wireless sensing signal and communication signal, the design of integrated channel/signal, etc.for further study.The challenges of integrated sensing and communication at the air interface were analyzed.It was pointed out that integrated sensing and communication at the air interface would have an important impact on the design of 6G RAN protocol stack, which needed to be focused on.

    KPI simulation method of harmonized communication and sensing in 6G
    Zhonghua CHEN, Ling JIN, Jianping SUN
    2022, 38(9):  77-82.  doi:10.11959/j.issn.1000-0801.2022257
    Asbtract ( 146 )   HTML ( 21)   PDF (823KB) ( 217 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    How to reasonably provide harmonized communication and sensing for different applications has become one of the important research directions of 5G network evolution and 6G technology.Based on the analysis of different scenarios and key performance indicators (KPIs), an architecture and brief realization including the implementation of each module of the harmonized communication and sensing simulation system was put forward.Furthermore, a correlation simulation case about communication spectrum efficiency and sensing range resolution was given to show how typical indicators work during the simulation under certain conditions.

    Research and Development
    Physical layer security of NOMA-D2D cooperative wireless system
    Yifan DING, Guangqiu LI, Hui LI
    2022, 38(9):  83-94.  doi:10.11959/j.issn.1000-0801.2022171
    Asbtract ( 181 )   HTML ( 20)   PDF (912KB) ( 210 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the physical layer security (PLS) application requirement of massive user equipments access in the future, the PLS model combining with non-orthogonal multiple access (NOMA), device-to-device (D2D) and relay cooperation was proposed.The model was composed of base station with transmit antenna selection (TAS), NOMA far cellular user of base station and D2D transmitter, D2D receiver and passive eavesdropper, the D2D transmitter was also assumed two roles of NOMA near user of base station and decode-and-forward relay.The approximate expressions for the secrecy outage probability, non-zero secrecy capacity probability and asymptotic secrecy outage probability of NOMA-D2D cooperative wireless system under two TAS schemes were derived by using Gaussian-Chebyshev Quadrature theorem.Numerical and simulation results verify the accuracy of PLS performance analysis of NOMA-D2D cooperative wireless system.The results also show that increasing the power allocated to far cellular user under constant total power of base station can effectively improve PLS performance of NOMA-D2D cooperative wireless system.

    Multi-channel based edge-learning graph convolutional network
    Shuai YANG, Ruiqin WANG, Hui MA
    2022, 38(9):  95-104.  doi:10.11959/j.issn.1000-0801.2022250
    Asbtract ( 158 )   HTML ( 20)   PDF (853KB) ( 282 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Usually the edges of the graph contain important information of the graph.However, most of deep learning models for graph learning, such as graph convolutional network (GCN) and graph attention network (GAT), do not fully utilize the characteristics of multi-dimensional edge features.Another problem is that there may be noise in the graph that affects the performance of graph learning.Multilayer perceptron (MLP) was used to denoise and optimize the graph data, and a multi-channel learning edge feature method was introduced on the basis of GCN.The multi-dimensional edge attributes of the graph were encoded, and the attributes contained in the original graph were modeled as multi-channel.Each channel corresponds to an edge feature attribute to constrain the training of graph nodes, which allows the algorithm to learn multi-dimensional edge features in the graph more reasonably.Experiments based on Cora, Tox21, Freesolv and other datasets had proved the effectiveness of denoising methods and multi-channel methods.

    Key technical solutions and standardization progress of high-speed optical modules
    Bingbing WU, Wenyu ZHAO, Haiyi ZHANG
    2022, 38(9):  105-115.  doi:10.11959/j.issn.1000-0801.2022249
    Asbtract ( 355 )   HTML ( 37)   PDF (981KB) ( 782 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Optical modules are the basic building blocks of 5G transport networks, data center interconnections and all-optical access networks.With the rapid development of upper-layer service and applications, high-speed optical modules had become the key element to achieve high bandwidth and wide coverage in various application fields.Based on the basic concepts and the overall view of standardization research of optical modules, the technical solutions, standardization status and market development trend of 400 Gbit/s, 800 Gbit/s intensity and phase modulation high-speed optical modules were focused on.Finally, suggestions to promote the healthy development of optical modules in the future were proposed.

    Induced spoofing detection method based on error valuation accumulation open-loop correction
    Lunlong ZHONG, Jiongpo LIU, Yongyu LIU
    2022, 38(9):  116-128.  doi:10.11959/j.issn.1000-0801.2022261
    Asbtract ( 87 )   HTML ( 6)   PDF (1160KB) ( 292 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Induced satellite spoofing interference can induce the aircraft to gradually deviate from the predetermined trajectory, and it is difficult to detect.So timely and effective detection of interference is the guarantee of flight safety.Based on the existing tightly integrated navigation system, an error valuation accumulation open-loop correction structure was designed.It was proved that the performance of the designed structure was equivalent to the performance of traditional tightly integrated navigation system with closed-loop correction.On the basis of designed structure, combining the tightly integrated navigation system with the adaptive sequential probability ratio test method, an induced spoofing detection method based on the error valuation accumulation open-loop correction was proposed.A spoofing detection statistic for induced spoofing detection was constructed by integrating the tightly integrated navigation information with other navigation information that was not affected by spoofing interference.Simulation results show that the designed open-loop correction structure can avoid the divergence problem of the integrated navigation filter caused by the inertial navigation system error accumulated over time.Moreover, the proposed spoofing detection method can improve the detection effect of the algorithm of the small induced spoofing under the “worst” case further.

    Student knowledge tracking based multi-indicator exercise recommendation algorithm
    Bin ZHUGE, Zhenghu YIN, Wenxue SI, Lei YAN, Ligang DONG, Xian JIANG
    2022, 38(9):  129-143.  doi:10.11959/j.issn.1000-0801.2022234
    Asbtract ( 254 )   HTML ( 33)   PDF (972KB) ( 366 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Personalized exercise recommendation was an important topic in the era of education informatization, the forgetting laws of students in the learning process were ignored by the traditional problem recommendation algorithm, which failed to fully tap the students’ knowledge mastery level and the common characteristics of similar students, insufficient, could not reasonably promote students’ learning of new knowledge or help students find and fill omissions.In view of the above defects, a multi-index exercise recommendation method based on student knowledge tracking was proposed, which was divided into two modules: preliminary screening and re-filtering of exercises, focusing on the novelty, difficulty and diversity of exercise recommendation.Firstly, a knowledge probability prediction (SF-KCCP) model combined with students’ forgetting law was constructed to ensure the novelty of the recommended exercises.Then, students’ knowledge and concept mastery level was accurately excavated based on the dynamic key-value knowledge tracking (DKVMN) model to ensure that exercises of appropriate difficulty were recommended.Finally, the user-based collaborative filtering (UserCF) algorithm was integrated into the re-filtering module, and the similarity between student groups was used to achieve the diversity of recommendation results.The proposed method is demonstrated by extensive experiments to achieve better performance than some existing baseline models.

    A method of planning and designing transmission networks for government and enterprises based on a rectangle-like distribution model combined with heat maps
    Shuchong NAN, Cheng CHEN, Xunbiao LIAN, Han WANG
    2022, 38(9):  144-150.  doi:10.11959/j.issn.1000-0801.2022244
    Asbtract ( 108 )   HTML ( 16)   PDF (1760KB) ( 88 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The circuit direction and service access point of the special line service for government enterprise group customers are decided by the customers themselves, and the service opening is extremely unpredictable.In order to effectively solve the problems of strong subjectivity, difficult adjustment, long cycle and low efficiency in the service opening of government and enterprise customers, a typical simulation environment and a quasi rectangular distribution model was built, and two deployment strategies combined with the thermal map were proposed.The simulation analysis shows that under the same conditions, the number of VC-OTN (VC cross connecting function with optical transport network) points meeting the coverage requirements decreases with the increase of the maximum access distance, the client point coverage increases with the increase of the deployed VC-OTN points, and the deployment benefit of strategy 2 (group coverage by maturity) is higher than that of strategy 1 (priority coverage of hot spots).When the coverage requirements are met, the number of VC points required by the theoretical minimum, strategy 1 and strategy 2 are 26, 58 and 50, respectively.This method provides reliable theoretical guidance for the accurate and rapid construction of network system, avoids blind deployment, improves the accuracy of deployment planning, and provides construction reference ideas for the subsequent construction of urban VC-OTN nodes.

    Engineering and Application
    Research on network intelligence for 6G
    Qingtian WANG, Yang LIU, Haitao LIU, Jiaying ZONG, Fengyi YANG
    2022, 38(9):  151-160.  doi:10.11959/j.issn.1000-0801.2022245
    Asbtract ( 249 )   HTML ( 53)   PDF (939KB) ( 346 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Intelligent network has been proposed as early as the 5G era.Towards the 6G era, the network will support more application scenarios and performance requirements.A fully-covered and fully-connected network system requires more intelligent management and maintenance.Firstly, the scope and new application scenarios for 6G networks were introduced, and then the research progress of early-stage network intelligence was summarized.Secondly, the current shortages and supporting technologies of network intelligence for 6G were summarized.Thirdly, the architecture of the intelligent network for 6G and give details about the intelligent function elements were presented, moreover, the use case about the indoor positioning to illustrate the process of network intelligence was given.At last, the evolution route of network intelligence with edge data center was depicted.

    Research on 5GtoB customized network based data offloading scheme
    Yaping CAO, Ying SUN, Huixiao ZHANG
    2022, 38(9):  161-168.  doi:10.11959/j.issn.1000-0801.2022162
    Asbtract ( 161 )   HTML ( 25)   PDF (900KB) ( 316 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the continuous evolution of 5G network, 5GtoB solution for industrial users is also more flexible.Data offloading can well meet the urgent needs of customers for data not leaving the park, local unloading, local support, low delay and so on.The demand background of data offloading capability in 5G network and the relevant principles of diversion technology were introduced.At the same time, combined with the actual deployment of operators' existing network, the application scenarios and technical implementation of two kinds of data offloading schemes based on multi data network name (DNN) and uplink classifier (UL CL) were expounded, and the advantages and limitations of different schemes were compared and analyzed.Finally, the feasibility of the scheme was verified by an actual case.

    5G-Advanced: network-controlled repeater
    Nan ZHANG, Ziyang LI, Ruyue LI, Wei CAO
    2022, 38(9):  169-176.  doi:10.11959/j.issn.1000-0801.2022047
    Asbtract ( 225 )   HTML ( 27)   PDF (1384KB) ( 389 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Radio frequency (RF) repeaters have been deployed in 2G, 3G and 4G to improve the coverage of cellular system.While it is treated as a cost effective solution to extend the network coverage, conventional RF repeaters simply perform amplify-and-forward operation based on the set-up without the capability of doing flexible adjustments based on control and scheduling indication from network.An overview on the new study item in 5G-Advanced was given, i.e.network-controlled repeater.As an enhancement over conventional RF repeaters, network-contrdled repeater will enable the repeater to receive and process repeater control information from the network and perform its amplify-and-forward operation in a more efficient manner including the directive forwarding of the signal, dynamic on-/off of transmissions and receptions, and simplified network integration.

    Research on VoNR voice wireless optimization strategy
    Xinchao ZANG, Ronglin LI
    2022, 38(9):  177-186.  doi:10.11959/j.issn.1000-0801.2022146
    Asbtract ( 210 )   HTML ( 31)   PDF (686KB) ( 393 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    There are two 5G voice solutions, EPS Fallback and VoNR.In the early stage of 5G network construction, 5G base station coverage rate and terminal penetration rate were not high, so EPS Fallback was used as a 5G voice transition solution.At present, with the deployment of 2.6 GHz and 700 MHz networks, the SA network achieves independent networking, and VoNR will be the main solution for 5G voice.In order to actively respond to the deployment of VoNR and analyze the advantages of VoNR from multiple dimensions, an in-depth research on VoNR features, parameters, and application scenarios were conducted, VoNR wireless strategy deployment was formulated, for uplink weak field, interference, large traffic characteristics of all kinds of scenarios functions such as deployment and optimization to provide suggestion and scheme, and prepares for VoNR’s official commercial use.

    Optimal strategy for maximizing energy efficiency of 4G and 5G coexistence network
    Yahui XUE, Zecai SHAO, Chunfeng CUI, Jing JIN, Hanning WANG
    2022, 38(9):  187-192.  doi:10.11959/j.issn.1000-0801.2022098
    Asbtract ( 167 )   HTML ( 24)   PDF (737KB) ( 192 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The energy efficiency of wireless networks has gradually become an important indicator for evaluating network performance.It’s very important to improve the energy efficiency of the coexisting 4G and 5G networks as there are differences in energy efficiency of them.Firstly, the energy consumption composition of base station was analyzed, energy consumption models for 4G and 5G base stations through measured data were established, and then its energy efficiency was evaluated through simulations.The results show that 4G and 5G have their own optimal energy-efficiency areas separated by the critical point of 500 Mbit/s, above which the 5G energy efficiency is better.When dual networks operate simultaneously under the proposed-solution where only 4G is used when the throughput is less than 500 Mbit/s and only 5G is used otherwise, the power consumption of a single station can be reduced by 53.4% and the energy efficiency can be improved by 116.4%.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: